First published: Mon Feb 24 2025(Updated: )
The WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 3.2. This is due to insufficient validation on the redirect url supplied via the 'redirect_to' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if 1. they can successfully trick them into performing an action and 2. the plugin is activated but not configured.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft 365 | <=3.2 | |
Microsoft 365 | <=3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1488 is classified as a medium severity vulnerability due to the risk of open redirect attacks.
To mitigate CVE-2025-1488, update the WPO365 | MICROSOFT 365 GRAPH MAILER plugin to version 3.3 or later.
Any user of the WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress versions up to and including 3.2 is affected by CVE-2025-1488.
CVE-2025-1488 is an open redirect vulnerability resulting from insufficient validation of the 'redirect_to' parameter.
Yes, CVE-2025-1488 can be exploited by unauthenticated users, allowing them to redirect users to malicious sites.